Retrieved from https://studentshare.org/information-technology/1640449-what-ever-you-can-name-it
https://studentshare.org/information-technology/1640449-what-ever-you-can-name-it.
Edward Snowden’s NSA LeaksEdward Snowden is well known for his role in revealing a number of surveillance programs undertaken by GCHQ and NSA. He revealed how the agencies access information of technology companies without warrants. Snowden also leaked that the agencies intercept data from fibre optic cables that make up the backbone of internet networks and global phone. The manner in which these agencies work to undermine security standards that commerce, banking and internet rely upon were revealed.
The NSA spying revelations were troubling and heart-breaking to many given the seriousness of certain information. The revealation was a show of gross violation of civil liberties. The Events Leading to Snowden’s RevealationsWhen Snowden resigned from CIA, he started working as a contractor at the NSA facility in the United States Military base in Japan. Snowden had excellent computer skills and was given top secret clearance. At the time, there were a lot of opportunities for contractors as the United States security outsourced intelligence tasks to outside private companies.
Snowden found out the all-consuming NSA surveillance activities. He was also keen to notice that the mechanisms that were built into the United States system to keep NSA in check were not working. While working for one of the 13 hubs that spied on Chinese interests, he made anonymous contacts with journalists and leaked top secret information to them. When he took a new job with the Booz Allen Hamilton, he got access to the list of machines that had been hacked by NSA from across the globe. He was among those who were allowed to look at the system.
Other people with top secret clearance did not have the permission to view all the classified files. Snowden was able to open files without leaving any electronic trace. He was a ghost user. As an administrator, he managed to persuade others to give him their login details. Snowden used his authority as a sysadmin to download documents to thumb drives. He was able to reach the NSA servers remotely from Hawaii. After completion of four weeks in his new job, he claimed to be unwell and requested for unpaid leave from his bosses at Booz.
Then, he disappeared. How the Events Could have been preventedThere are a number of measures that should have been ensured to prevent Snowden’s leaks. Firstly, the top secret clearance should have been given to people with clear motives who have passed integrity tests. Secondly, there should have been a strong security policy baring any staff from disclosing his/her login details to prevent unauthorized access to files. Besides, the use of thumb drives should have been denied to all staffs including system administrators.
It is very clear that Snowden used his position to leak information. Moreover, his sudden claims on illness and request for unpaid leave raised eyebrows. He should have been suspected from the outset.ConclusionEdward Snowden may have revealed information that was deemed beneficial to the fight for civil liberties. However, the leaks had far-reaching effects. His revelations should have been curtailed. The water has already spilled and steps should be taken to prevent future occurrencesRecommendationsNSA should never have laxity on the part of their systems and staffsAccess rights should be allocated to authorized staffRules and regulations should apply across the board.
Works CitedCrew, M A, and T J. Brennan. The Role of the Postal and Delivery Sector in a Digital Age. Cheltenham: Edward Elgar Publishing, 2014. Internet resource.Greenwald Glenn, The Surveillance State. London: Hamish Hamilton, 2014. Print
Read More